Sorry to not follow the template but it’s a recurrent error between any web server and I guess it’s more a more conceptual quesiton:
why when I put example.com in place of www.example.com, it’s considered by chrome and firefox as insecure even if they recognize the cert as valid?
It’s the same certificate and it’s the same configuration for both. Is there a configuraiton option for the domain or maybe as a general concept, the domain is always considered as insecured?
A wildcard only covers subdomains - so for example a certificate for *.example.com covers www.example.com and blog.example.com and anythingelse.example.com but it does not cover example.com itself, nor does it cover deeper levels of subdomains such as one.two.example.com
You can however get a certificate covering both the wildcard and the base domain - you just have to request both. For example with certbot you would use
well that’s what I’ve done.
-d “*.example.com” -d example.com
and as I stated, the cert is considered as valid. But maybe I’m wrong or I have another problem.
May someone show me what I should have in the new google chrome 67 for example for a cert who have several domains and subdomains valid for it? for the moment what it gives me it’s issued to *.example.com , but maybe it’s normal…
If your certificate is valid for example.com then browsers shouldn’t complain when it’s used on https://example.com. If they do, maybe it’s not installed correctly?
It’s normal for the “common name” or CN of the certificate to just be one of the names it’s valid for. The real list of valid names is in the “subjectAltName” extension.
Si apparently there is a cache problem about certificate. Is there a special cache for certificate or something alike ? Or is it the general cache and I should delete it all ?